Research seminar course - provisional assignment of papers
Week # Talk # Student Mentor Paper
2 2.1 David Birch Paul Interactive Geometric Simulation of 4D Cities
Basil Weber, Pascal Mueller, Peter Wonka and Markus Gross
3 3.1 Xiuyu Fan Herbert What errors do peer-reviewers detect?
Sara Schroter, Nick Black et al J R Soc Med 2008 101:507-514.  http://jrsm.rsmjournals.com/cgi/content/full/101/10/507 (access on-campus or via VPN only)
3 3.2 Michael Lange Uli Zonal methods for the parallel execution of range-limited N-body simulations
Bowers, Dror, Shaw; J. Comput. Phys. 221, 1 (Jan. 2007), 303-329. DOI= http://dx.doi.org/10.1016/j.jcp.2006.06.014 
4 4.1 Cancelled Paul Cancelled - likely to be filled with a talk from later in the schedule
4 4.2 Dianhuan Lin Herbert Causality in Action Theories
Camilla Schwind,  Electronic Transactions on Artificial Intelligence, Vol. 3 (1999), Section A, pp. 27-50. http://www.ep.liu.se/ej/etai/1999/007/.  See discussion at http://www.ida.liu.se/ext/etai/ra/rac/018/rppf.html
5 5.1 Andrew Jones Uli The Effect of Tossing Coins in Omega-Automata
Christel Baier, Nathalie Bertrand, Marcus Groesser: Proc. of the 20th International Conference on Concurrency Theory (CONCUR
> '09), Lecture Notes in Computer Science, Volume 5710 pp. 15-29, 2009 http://dx.doi.org/10.1007/978-3-642-04081-8_2
5 5.2 Jun Jiao Paul Interactive Digital Photomontage. 
Aseem Agarwala, Mira Dontcheva, Maneesh Agrawala, Steven Drucker, Alex Colburn, Brian Curless, David Salesin, Michael Cohen. ACM Transactions on Graphics (Proceedings of SIGGRAPH 2004), 2004. http://grail.cs.washington.edu/projects/photomontage/
6 6.1 Faris Abou-Saleh Herbert A Dynamic logical perspective on quantum behaviour - Baltag and Smets, 2008 - http://www.springerlink.com/content/5733821v37674231/
6 6.2 Will Jones Uli On the (Im)possibility of Obfuscating Programs
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang:
Proc. of Advances in Cryptology - CRYPTO `01, Lecture Notes in Computer Science, Volume 2139, pp. 1-18, 2001. http://www.math.ias.edu/~boaz/Papers/obfuscate.html 
We will be reading the conference paper http://www.springerlink.com/content/telalqdcx3n600uf/ - but see the other versions (longer might be easier), presentations and discussion
7 7.1 Huaxin Wang Paul Dynamic Instruction Reuse
Sodani & Sohi, 1997 - ftp://ftp.cs.wisc.edu/sohi/papers/1997/isca.inst-reuse.pdf 
7 7.2 Victor Faion Herbert Software watermarking in the frequency domain: Implementation, analysis, and attacks
Journal of Computer Security, Volume 13, Issue 5, http://iospress.metapress.com/content/4m5d4q72wlabc9cl/ (there are known problems with accessing this site)
8 8.1 Ognjen Rudovic Uli Does the h index have predictive power?  
J. E. Hirsch.  Proceedings of the National Academy of Science, December 4, 2007   vol. 104  no. 49  19193-19198.  http://www.pnas.org/content/104/49/19193.abstract
8 8.2 Anton Stefanek Paul Making Lockless Synchronization Fast: Performance Implications of Memory Reclamation 
Hart, McKenney, and Demke Brown (2006).  <http://www.rdrop.com/users/paulmck/RCU/hart_ipdps06.pdf>/ An IPDPS 2006 Best Paper <http://www.ipdps.org/ipdps2006/2006_advance_program.html>
9 9.1 Barnaby Malet Herbert Transforming out timing leaks
Johan Agat.  Proc. of the 27th Symposium on Principles of programming languages Boston, MA, USA pp 40 - 53, 2000 http://doi.acm.org/10.1145/325694.325702
9 9.2 Nicholas Ball Uli Producing Wrong data without doing anything obviously wrong
Diwan, Hauswirth & Sweeney 2009 - http://www-plan.cs.colorado.edu/diwan/asplos09.pdf
10 10.1
10 10.2
11 11.1